216
edits
Line 13: | Line 13: | ||
In this implementation, similar recordings of ambient audio from mobile devices in proximity are utilised for the generation of a secure key. | In this implementation, similar recordings of ambient audio from mobile devices in proximity are utilised for the generation of a secure key. | ||
An attacker that is farther away is not able to guess the same key with a recording of her own since the features in the ambient audio differ with location. | An attacker that is farther away is not able to guess the same key with a recording of her own since the features in the ambient audio differ with location. | ||
However, the robustness of the generated key is dependent on properties of ambient audio. | |||
In previous studies, we experienced best pairing characteristics when devices are in an environment with a single loud audio source. | |||
When environmental noise is, however, more ubiquitous and noisy, it is easier for an attacker to generate a key that is similar to that of the legitimate communication partners. | |||
In this project we will develop a mechanism to adapt the parameter of the underlying approach to generate secure to changing environmental parameters. | |||
[[File:AudioSynch.png]] | |||
== Required Skills == | == Required Skills == |
edits